Implement various application servers for an organisation

Assignment Help Computer Network Security
Reference no: EM133154915

BN206 System Administration

Assignment - Group report, with individual demonstration

Assessment - Design, Installation and Configure Network Servers.

Learning Outcome 1: Understand various server management systems;
Learning Outcome 2: Manage emerging tools and techniques for system management;
Learning Outcome 3: Apply human usability in systems and documentation within the context of constantly changing modern industry requirements;
Learning Outcome 4: Plan and implement various application servers for an organisation

This assignment has 2 parts: Prepare a system documentation report and demonstrate the understanding of the system implemented

Form a group of Three students and inform your lab tutor of the names and student IDs of your group members. Assume that your group is hired by a client company to develop a networked system for their required services as described in the scenario.

Your task in this assignment is to analyse client requirements, design solutions, implement, configure, and troubleshoot implemented solutions, and finally to prepare a system documentation report meeting the client requirements and following a standard industry template. Detailed requirements are provided below:

Question 1. Based on the scenario given below, (i) analyse client requirements, (ii) identify and propose the required servers and server roles (services), and (iii) provide required configurations for the scenario.

Question 2. Perform the configurations using either virtually or physically installed server OS to realise the scenario. Students can use Windows Server 2016 or a higher version, or Linux server if appropriate. Your submission should include screenshots of each important step.

Question 3. Prepare a detailed system documentation report. This report will serve as an important part of backup and disaster recovery documentation. As such, you must consider human usability factors and include the configurations using description of each important step, and screenshots corresponding to those in a way that will be useful to the target users of the document. Essential sections of the documentation are provided in the marking guide, however, you can include additional sections if deemed useful. You should explain how documentation of network changes should be handled and how documentation can aid the troubleshooting process by keeping a record of common issues.

Question 4. Use your configured system to demonstrate individually the implemented scenario during your week-12 lab. Individual understanding will be tested during your demonstration.

Scenario: Implement Windows Server Active Directory Domain Services (ADDS) infrastructure.

ABC Pty Ltd is a SME (Small to Medium Enterprise) based in Melbourne. The company is a new start-up specialises in designing and manufacturing widgets. The company has 60 employees at their new Head Office in Melbourne. The company decided to setup a LAN infrastructure environment with Centralised authentication and resources (object) management. The organisation structure is based on different departments named Sales, HR, Operation, Finance and Marketing. The company has hired you as a System Administrator, and your job is to create a LAN infrastructure design and provide a solution to manage objects (such as users, computers, file shares, printer's apps, groups etc.) belongs to each department.

Your Tasks:

1. Design a LAN Infrastructure for 60 users and determine the feasibility in your design for number of Servers, Clients computers, Printers, Routers and Switches.

2. Configure a DHCP (Dynamic Host Configuration Protocol) to acquire automatic IP address.

3. Create ABC Domain, a new forest and provide centralized user authentication.

4. Create OUs (Organisational Units) and Groups based on department name and create two users and two computers for each department

5. Create folders for each department and set the sharing privileges only to corresponding department users who can access the shared files.

6. Configure two Group policies e.g. Disable Guest Account and Set Minimum Password Length to Higher Limits 12 Characters

7. Install and configure IIS web services.

8. The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files, and state your assumption clearly.

9. Table of servers, with MAC addresses, allocated IP addresses, client IP address ranges.

10. Installation and configuration details of all the servers in detail.

Reference no: EM133154915

Questions Cloud

What amount should be reported as profit before tax : The income before tax for the year ended December 31, 2021 at P9,000,000. What amount should be reported as profit before tax
Tall organization and a flat organization : What is the difference between a tall organization and a flat organization? What are the advantages and disadvantages of each?
What is conflict style : What is your conflict style? How has that impacted the workings of your team to date? What can the team do to establish a culture that pursues differences of th
CARL COPPOLINO Florida murder trial : In the case study of CARL COPPOLINO'S Florida murder trial , what legal issue was raised on appeal by the defense in Carl Coppolino's Florida murder trial?
Implement various application servers for an organisation : Design, Installation and Configure Network Servers - Plan and implement various application servers for an organisation
What total amount should be recognized in profit : What total amount should be recognized in profit or loss of Sushi Inc. for the year ended December 31, 2021 to reflect adjusting events
Explain problem in traditional approach with linear : Explain the problem in a traditional approach with a linear cause and effect as well as how it can be resolved.
Indicate how these accounts would be reported : Accounts Receivable $224,000, and Billings on Construction in Process $1,030,000. Indicate how these accounts would be reported in Headland's December 31, 2020
What is the amount they must invest today : What is the amount they must invest today to reach their goal if the annual rate of return is 9%

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd